A trust infrastructure based authentication method for clustered vehicular ad hoc networks

被引:0
作者
Fatemehsadat Mirsadeghi
Marjan Kuchaki Rafsanjani
Brij B. Gupta
机构
[1] Shahid Bahonar University of Kerman,Department of Computer Science, Faculty of Mathematics and Computer
[2] National Institute of Technology,Department of Computer Engineering
[3] Asia University,Department of Computer Science and Information Engineering
[4] Macquarie University,undefined
来源
Peer-to-Peer Networking and Applications | 2021年 / 14卷
关键词
Vehicular ad hoc networks (VANETs); Authentication; Trust management; Clustering; Monitoring;
D O I
暂无
中图分类号
学科分类号
摘要
Vehicular Ad hoc Networks (VANETs) as a subset of mobile ad hoc networks which allow communication between any vehicle with other adjacent vehicles, road side units and infrastructure. In these networks, the purpose is to enhance the security, improve the management of urban and road traffic and provide services to the passenger. Due to problems such as reliability and privacy, messages that are exchanged in the network should be confidential and secure. Therefore, we need a secure topology to maintain trust, which enables the cryptographic process. In this paper, a trust based authentication method for clustered vehicular ad hoc networks is proposed. The efficient authentication method should be able to accurately detect malicious nodes and reduced delay and overhead. The main purpose of the proposed method is to create trustworthy and stable clusters that lead to the stability of the entire network. For this purpose, we estimate the trust degree of each vehicle by combining the trust between vehicles and the trust between the vehicle and Road Side Units (RSUs), and Cluster Heads (CHs) are selected based on this estimated trust degree. Cluster Heads along with verifiers are responsible for monitoring each vehicle. On the other hand, the cluster heads provide an optimal and secure route for transmitting messages. Messages are digitally signed by the sender and encrypted using a public/private key as distributed by a Trusted Authority (TA) and decrypted by the destination; so that each message contains a certificate from a trusted authority. In this identification, the sender and receiver of the message are verified and authentication will be achieved. By simulation results, it is proves that the proposed method increases the accuracy in detecting malicious nodes and the packet delivery ratio, and decreases the delay of authentication and overhead.
引用
收藏
页码:2537 / 2553
页数:16
相关论文
共 94 条
[31]  
Deen A(undefined)undefined undefined undefined undefined-undefined
[32]  
Mejri MN(undefined)undefined undefined undefined undefined-undefined
[33]  
Ben-Othman J(undefined)undefined undefined undefined undefined-undefined
[34]  
Hamdi M(undefined)undefined undefined undefined undefined-undefined
[35]  
Minhas UF(undefined)undefined undefined undefined undefined-undefined
[36]  
Zhang J(undefined)undefined undefined undefined undefined-undefined
[37]  
Tran T(undefined)undefined undefined undefined undefined-undefined
[38]  
Cohen R(undefined)undefined undefined undefined undefined-undefined
[39]  
Cheriton DR(undefined)undefined undefined undefined undefined-undefined
[40]  
Mármol FG(undefined)undefined undefined undefined undefined-undefined